• Online, Self-Paced
Course Description

In this course, you'll learn to identify potential data loss indicators noted from a traffic profile. Then, you'll explore the 5-tuple approach for isolating a host. Finally, there are different detection methods that are used when securing networks dynamically. You'll review the similarities between them and how they operate to bring about usable results. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

Learning Objectives

{"identify traffic profile key values that flag potential data loss","classify network traffic types that indicate potential data loss","identify potential sources of data loss via network infrastructure configurations","describe different types of data loss and concerns regarding data loss"}

Framework Connections